Tabletop Exercise Kit

KEV Exploitation Tabletop Kit

A 60–90 minute exercise for public-sector teams to practice decisions around emergency patching, downtime approval, compensating controls, and leadership communications when a known exploited vulnerability affects an important system.

Expected time

  • Standard: 60–90 minutes
  • Short version: 45 minutes
  • Extended version: up to 2 hours with deeper hotwash

Best participants

  • IT leadership
  • security staff
  • infrastructure or application owners
  • executive sponsor / department leadership
  • communications / PIO

What this exercise practices

Threat context

This exercise includes a fictional threat profile — Spectral Raccoon / APT-1337 — to provide a consistent scenario context for participants. The profile is used to support discussion and decision-making during the exercise; it is not intended to represent real-world attribution.

Included materials

Recommended flow

  1. Review the facilitator guide and threat brief.
  2. Tailor the scenario to the real technology and services in your environment.
  3. Distribute the threat snapshot to participants.
  4. Run the injects and force clear decisions on downtime, patching, compensating controls, and communications.
  5. Capture follow-up actions in the hotwash.